Results 11 to 20 of about 4,301,094 (348)

Computer Security

open access: yesIssues in Science and Technology Librarianship, 2002
This guide is intended to present a selected list of sites that cover the basic issues of computer security and which provide useful information for the non-expert (librarian, undergraduate student, office manager, etc.) who wants to learn more about ...
Jane F. Kinkus
doaj   +2 more sources

COMPUTER SECURITY AND SECURITY TECHNOLOGIES [PDF]

open access: yesJournal of Process Management and New Technologies, 2013
With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution.
Lazar Stošić, Dragan Veličković
doaj   +3 more sources

Understanding Computer Security [PDF]

open access: yesFrontiers in ICT, 2014
Few things in society and everyday life have changed in the last 10 years as much as the concept of security. From bank robberies to wars, what used to imply a great deal of violence is now silently happening on the Internet. Perhaps more strikingly, the very idea of privacy – a concept closely related to that of individual freedom – is undergoing such
Nicola Zannone   +2 more
openaire   +2 more sources

Using deep learning to solve computer security challenges: a survey [PDF]

open access: yesCybersecurity, 2019
Although using machine learning techniques to solve computer security challenges is not a new idea, the rapidly emerging Deep Learning technology has recently triggered a substantial amount of interests in the computer security community.
Yoon-Ho Choi   +7 more
semanticscholar   +1 more source

Security Fictions: Bridging Speculative Design and Computer Security

open access: yesConference on Designing Interactive Systems, 2020
This paper begins with an observation: that threat identification is an intrinsically speculative practice. It requires imagining possible futures. Drawing on methods from speculative design, this paper presents an improvisational role-playing game ...
Nick Merrill
semanticscholar   +1 more source

Demystifying Blockchain Technology for Resource-Constrained IoT Devices: Parameters, Challenges and Future Perspective

open access: yesIEEE Access, 2021
One of the most promising enablers for the secure distributed operation of the Internet of Things (IoT) systems could be based on a mathematical construct widely known as blockchain that aims to neglect the system’s centralization and scalability ...
Inna Romashkova   +2 more
doaj   +1 more source

Analysis of Computer Network Information Security and Protection Strategy [PDF]

open access: yesMATEC Web of Conferences, 2019
Computers are closely related to our life and work. We have entered an era in which computers are not available in all walks of life. Among them, many important documents and materials will be stored in the form of electronic files in the computer ...
Ming Xiaobo, Chen Ying, Guo Jinhua
doaj   +1 more source

Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks

open access: yesIEEE Access, 2021
Power consumption and electromagnetic emissions analyses are well established attack avenues for secret values extraction in a large range of embedded devices.
Francesco Antognazza   +2 more
doaj   +1 more source

Federated Secure Computing

open access: yesInformatics, 2023
Privacy-preserving computation (PPC) enables encrypted computation of private data. While advantageous in theory, the complex technology has steep barriers to entry in practice. Here, we derive design goals and principles for a middleware that encapsulates the demanding cryptography server side and provides a simple-to-use interface to client-side ...
Hendrik Ballhausen   +1 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy